Understanding & Detecting C2 Frameworks — BabyShark
Understanding & Detecting C2 Frameworks — BabyShark by Nasreddine Bencherchali Hello and welcome to the fourth blog post in this …
Read MoreRansomware Statistics, Trends and Facts for 2020 and Beyond
Ransomware Statistics, Trends and Facts for 2020 and Beyond by Aleksandar Kochovski Ransomware attacks are growing in size and frequency, …
Read MoreBGP Hijacking Attack
BGP Hijacking Attack by Nairuz Abulhul Last year in April, I read about the BGP hijacking incident by Rostelecom — …
Read MoreExploiting Remote File Inclusion with SMB
Exploiting Remote File Inclusion with SMB by Nairuz Abulhul Recently working on the Sniper machine on hack the box, I …
Read MoreInsecure Deserialization with JSON .NET
Insecure Deserialization with JSON .NET by Nairuz Abulhul Today, I will go over one of the OWASP’s top 10 vulnerabilities, …
Read More7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021
7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021 by Dr. Alina Matyukhina Smart technology is expected to grow …
Read More